Date
June 24, 2025, 11:37 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 76.303171] ================================================================== [ 76.310490] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 76.317634] Write of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 76.325298] [ 76.326824] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 76.326853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.326861] Hardware name: Thundercomm Dragonboard 845c (DT) [ 76.326871] Call trace: [ 76.326879] show_stack+0x20/0x38 (C) [ 76.326898] dump_stack_lvl+0x8c/0xd0 [ 76.326916] print_report+0x118/0x608 [ 76.326934] kasan_report+0xdc/0x128 [ 76.326953] kasan_check_range+0x100/0x1a8 [ 76.326972] __kasan_check_write+0x20/0x30 [ 76.326987] copy_user_test_oob+0x35c/0xec8 [ 76.327004] kunit_try_run_case+0x170/0x3f0 [ 76.327022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.327042] kthread+0x328/0x630 [ 76.327057] ret_from_fork+0x10/0x20 [ 76.327073] [ 76.396165] Allocated by task 383: [ 76.399616] kasan_save_stack+0x3c/0x68 [ 76.403520] kasan_save_track+0x20/0x40 [ 76.407425] kasan_save_alloc_info+0x40/0x58 [ 76.411758] __kasan_kmalloc+0xd4/0xd8 [ 76.415574] __kmalloc_noprof+0x198/0x4c8 [ 76.419650] kunit_kmalloc_array+0x34/0x88 [ 76.423811] copy_user_test_oob+0xac/0xec8 [ 76.427973] kunit_try_run_case+0x170/0x3f0 [ 76.432222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.437786] kthread+0x328/0x630 [ 76.441066] ret_from_fork+0x10/0x20 [ 76.444708] [ 76.446230] The buggy address belongs to the object at ffff0000947c2c00 [ 76.446230] which belongs to the cache kmalloc-128 of size 128 [ 76.458879] The buggy address is located 0 bytes inside of [ 76.458879] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 76.471450] [ 76.472972] The buggy address belongs to the physical page: [ 76.478614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 76.486712] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 76.494460] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 76.501516] page_type: f5(slab) [ 76.504712] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 76.512550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.520389] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 76.528312] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.536237] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 76.544160] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 76.552080] page dumped because: kasan: bad access detected [ 76.557722] [ 76.559252] Memory state around the buggy address: [ 76.564111] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.571423] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.578729] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 76.586039] ^ [ 76.593262] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.600575] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.607888] ================================================================== [ 77.239310] ================================================================== [ 77.246620] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 77.253763] Read of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 77.261340] [ 77.262865] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 77.262894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.262902] Hardware name: Thundercomm Dragonboard 845c (DT) [ 77.262912] Call trace: [ 77.262918] show_stack+0x20/0x38 (C) [ 77.262934] dump_stack_lvl+0x8c/0xd0 [ 77.262952] print_report+0x118/0x608 [ 77.262970] kasan_report+0xdc/0x128 [ 77.262988] kasan_check_range+0x100/0x1a8 [ 77.263007] __kasan_check_read+0x20/0x30 [ 77.263022] copy_user_test_oob+0x4a0/0xec8 [ 77.263041] kunit_try_run_case+0x170/0x3f0 [ 77.263058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.263078] kthread+0x328/0x630 [ 77.263092] ret_from_fork+0x10/0x20 [ 77.263110] [ 77.332135] Allocated by task 383: [ 77.335591] kasan_save_stack+0x3c/0x68 [ 77.339490] kasan_save_track+0x20/0x40 [ 77.343387] kasan_save_alloc_info+0x40/0x58 [ 77.347726] __kasan_kmalloc+0xd4/0xd8 [ 77.351534] __kmalloc_noprof+0x198/0x4c8 [ 77.355604] kunit_kmalloc_array+0x34/0x88 [ 77.359770] copy_user_test_oob+0xac/0xec8 [ 77.363937] kunit_try_run_case+0x170/0x3f0 [ 77.368191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.373761] kthread+0x328/0x630 [ 77.377046] ret_from_fork+0x10/0x20 [ 77.380682] [ 77.382205] The buggy address belongs to the object at ffff0000947c2c00 [ 77.382205] which belongs to the cache kmalloc-128 of size 128 [ 77.394857] The buggy address is located 0 bytes inside of [ 77.394857] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 77.407426] [ 77.408950] The buggy address belongs to the physical page: [ 77.414596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 77.422703] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 77.430452] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 77.437505] page_type: f5(slab) [ 77.440703] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 77.448539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.456375] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 77.464296] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.472218] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 77.480139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 77.488058] page dumped because: kasan: bad access detected [ 77.493703] [ 77.495225] Memory state around the buggy address: [ 77.500080] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.507392] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.514703] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.522013] ^ [ 77.529235] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.536547] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.543857] ================================================================== [ 75.672698] ================================================================== [ 75.686193] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 75.693341] Write of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 75.701008] [ 75.702538] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 75.702570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.702578] Hardware name: Thundercomm Dragonboard 845c (DT) [ 75.702590] Call trace: [ 75.702597] show_stack+0x20/0x38 (C) [ 75.702616] dump_stack_lvl+0x8c/0xd0 [ 75.702636] print_report+0x118/0x608 [ 75.702656] kasan_report+0xdc/0x128 [ 75.702675] kasan_check_range+0x100/0x1a8 [ 75.702694] __kasan_check_write+0x20/0x30 [ 75.702710] copy_user_test_oob+0x234/0xec8 [ 75.702729] kunit_try_run_case+0x170/0x3f0 [ 75.702749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.702770] kthread+0x328/0x630 [ 75.702785] ret_from_fork+0x10/0x20 [ 75.702803] [ 75.771925] Allocated by task 383: [ 75.775379] kasan_save_stack+0x3c/0x68 [ 75.779285] kasan_save_track+0x20/0x40 [ 75.783190] kasan_save_alloc_info+0x40/0x58 [ 75.787520] __kasan_kmalloc+0xd4/0xd8 [ 75.791336] __kmalloc_noprof+0x198/0x4c8 [ 75.795411] kunit_kmalloc_array+0x34/0x88 [ 75.799571] copy_user_test_oob+0xac/0xec8 [ 75.803733] kunit_try_run_case+0x170/0x3f0 [ 75.807980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.813543] kthread+0x328/0x630 [ 75.816825] ret_from_fork+0x10/0x20 [ 75.820465] [ 75.821989] The buggy address belongs to the object at ffff0000947c2c00 [ 75.821989] which belongs to the cache kmalloc-128 of size 128 [ 75.834639] The buggy address is located 0 bytes inside of [ 75.834639] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 75.847211] [ 75.848743] The buggy address belongs to the physical page: [ 75.854385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 75.862491] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 75.870239] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 75.877297] page_type: f5(slab) [ 75.880492] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 75.888330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.896168] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 75.904091] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.912014] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 75.919936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 75.927856] page dumped because: kasan: bad access detected [ 75.933497] [ 75.935030] Memory state around the buggy address: [ 75.939886] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.947202] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.954516] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 75.961826] ^ [ 75.969050] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.976362] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.983673] ================================================================== [ 76.927172] ================================================================== [ 76.934488] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 76.941634] Write of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 76.949300] [ 76.950825] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 76.950854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.950861] Hardware name: Thundercomm Dragonboard 845c (DT) [ 76.950872] Call trace: [ 76.950879] show_stack+0x20/0x38 (C) [ 76.950896] dump_stack_lvl+0x8c/0xd0 [ 76.950913] print_report+0x118/0x608 [ 76.950931] kasan_report+0xdc/0x128 [ 76.950949] kasan_check_range+0x100/0x1a8 [ 76.950969] __kasan_check_write+0x20/0x30 [ 76.950986] copy_user_test_oob+0x434/0xec8 [ 76.951004] kunit_try_run_case+0x170/0x3f0 [ 76.951022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.951042] kthread+0x328/0x630 [ 76.951056] ret_from_fork+0x10/0x20 [ 76.951073] [ 77.020199] Allocated by task 383: [ 77.023655] kasan_save_stack+0x3c/0x68 [ 77.027555] kasan_save_track+0x20/0x40 [ 77.031453] kasan_save_alloc_info+0x40/0x58 [ 77.035792] __kasan_kmalloc+0xd4/0xd8 [ 77.039602] __kmalloc_noprof+0x198/0x4c8 [ 77.043672] kunit_kmalloc_array+0x34/0x88 [ 77.047839] copy_user_test_oob+0xac/0xec8 [ 77.052005] kunit_try_run_case+0x170/0x3f0 [ 77.056258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.061827] kthread+0x328/0x630 [ 77.065113] ret_from_fork+0x10/0x20 [ 77.068750] [ 77.070274] The buggy address belongs to the object at ffff0000947c2c00 [ 77.070274] which belongs to the cache kmalloc-128 of size 128 [ 77.082924] The buggy address is located 0 bytes inside of [ 77.082924] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 77.095494] [ 77.097017] The buggy address belongs to the physical page: [ 77.102664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 77.110771] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 77.118518] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 77.125572] page_type: f5(slab) [ 77.128771] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 77.136607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.144444] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 77.152366] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.160289] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 77.168210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 77.176127] page dumped because: kasan: bad access detected [ 77.181774] [ 77.183296] Memory state around the buggy address: [ 77.188151] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.195463] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.202774] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.210084] ^ [ 77.217306] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.224618] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.231927] ================================================================== [ 75.991135] ================================================================== [ 75.998459] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 76.005605] Read of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 76.013184] [ 76.014712] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 76.014742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.014750] Hardware name: Thundercomm Dragonboard 845c (DT) [ 76.014761] Call trace: [ 76.014768] show_stack+0x20/0x38 (C) [ 76.014786] dump_stack_lvl+0x8c/0xd0 [ 76.014805] print_report+0x118/0x608 [ 76.014825] kasan_report+0xdc/0x128 [ 76.014843] kasan_check_range+0x100/0x1a8 [ 76.014864] __kasan_check_read+0x20/0x30 [ 76.014880] copy_user_test_oob+0x728/0xec8 [ 76.014897] kunit_try_run_case+0x170/0x3f0 [ 76.014915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.014937] kthread+0x328/0x630 [ 76.014950] ret_from_fork+0x10/0x20 [ 76.014967] [ 76.083987] Allocated by task 383: [ 76.087439] kasan_save_stack+0x3c/0x68 [ 76.091346] kasan_save_track+0x20/0x40 [ 76.095249] kasan_save_alloc_info+0x40/0x58 [ 76.099581] __kasan_kmalloc+0xd4/0xd8 [ 76.103396] __kmalloc_noprof+0x198/0x4c8 [ 76.107471] kunit_kmalloc_array+0x34/0x88 [ 76.111633] copy_user_test_oob+0xac/0xec8 [ 76.115795] kunit_try_run_case+0x170/0x3f0 [ 76.120044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.125607] kthread+0x328/0x630 [ 76.128887] ret_from_fork+0x10/0x20 [ 76.132528] [ 76.134053] The buggy address belongs to the object at ffff0000947c2c00 [ 76.134053] which belongs to the cache kmalloc-128 of size 128 [ 76.146702] The buggy address is located 0 bytes inside of [ 76.146702] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 76.159266] [ 76.160798] The buggy address belongs to the physical page: [ 76.166440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 76.174548] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 76.182297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 76.189352] page_type: f5(slab) [ 76.192547] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 76.200385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.208223] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 76.216145] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.224069] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 76.231993] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 76.239911] page dumped because: kasan: bad access detected [ 76.245552] [ 76.247085] Memory state around the buggy address: [ 76.251943] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.259258] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.266573] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 76.273884] ^ [ 76.281107] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.288420] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.295731] ================================================================== [ 76.615255] ================================================================== [ 76.622563] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 76.629699] Read of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 76.637278] [ 76.638804] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 76.638833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.638842] Hardware name: Thundercomm Dragonboard 845c (DT) [ 76.638854] Call trace: [ 76.638860] show_stack+0x20/0x38 (C) [ 76.638877] dump_stack_lvl+0x8c/0xd0 [ 76.638895] print_report+0x118/0x608 [ 76.638913] kasan_report+0xdc/0x128 [ 76.638932] kasan_check_range+0x100/0x1a8 [ 76.638951] __kasan_check_read+0x20/0x30 [ 76.638966] copy_user_test_oob+0x3c8/0xec8 [ 76.638984] kunit_try_run_case+0x170/0x3f0 [ 76.639000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.639021] kthread+0x328/0x630 [ 76.639035] ret_from_fork+0x10/0x20 [ 76.639051] [ 76.708088] Allocated by task 383: [ 76.711539] kasan_save_stack+0x3c/0x68 [ 76.715443] kasan_save_track+0x20/0x40 [ 76.719347] kasan_save_alloc_info+0x40/0x58 [ 76.723679] __kasan_kmalloc+0xd4/0xd8 [ 76.727495] __kmalloc_noprof+0x198/0x4c8 [ 76.731571] kunit_kmalloc_array+0x34/0x88 [ 76.735732] copy_user_test_oob+0xac/0xec8 [ 76.739894] kunit_try_run_case+0x170/0x3f0 [ 76.744142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.749706] kthread+0x328/0x630 [ 76.752988] ret_from_fork+0x10/0x20 [ 76.756629] [ 76.758152] The buggy address belongs to the object at ffff0000947c2c00 [ 76.758152] which belongs to the cache kmalloc-128 of size 128 [ 76.770802] The buggy address is located 0 bytes inside of [ 76.770802] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 76.783373] [ 76.784905] The buggy address belongs to the physical page: [ 76.790546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 76.798645] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 76.806394] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 76.813439] page_type: f5(slab) [ 76.816635] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 76.824470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.832308] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 76.840231] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.848155] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 76.856077] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 76.863997] page dumped because: kasan: bad access detected [ 76.869639] [ 76.871170] Memory state around the buggy address: [ 76.876029] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.883342] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.890647] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 76.897957] ^ [ 76.905180] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.912494] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.919805] ==================================================================
[ 37.857996] ================================================================== [ 37.858133] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 37.858325] Read of size 121 at addr fff00000c77e6a00 by task kunit_try_catch/296 [ 37.858471] [ 37.858664] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 37.859048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.859210] Hardware name: linux,dummy-virt (DT) [ 37.859329] Call trace: [ 37.859428] show_stack+0x20/0x38 (C) [ 37.859675] dump_stack_lvl+0x8c/0xd0 [ 37.859809] print_report+0x118/0x608 [ 37.859956] kasan_report+0xdc/0x128 [ 37.860074] kasan_check_range+0x100/0x1a8 [ 37.860220] __kasan_check_read+0x20/0x30 [ 37.860447] copy_user_test_oob+0x728/0xec8 [ 37.860727] kunit_try_run_case+0x170/0x3f0 [ 37.860984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.861260] kthread+0x328/0x630 [ 37.861439] ret_from_fork+0x10/0x20 [ 37.861633] [ 37.861689] Allocated by task 296: [ 37.861773] kasan_save_stack+0x3c/0x68 [ 37.861907] kasan_save_track+0x20/0x40 [ 37.862050] kasan_save_alloc_info+0x40/0x58 [ 37.862252] __kasan_kmalloc+0xd4/0xd8 [ 37.862505] __kmalloc_noprof+0x198/0x4c8 [ 37.862611] kunit_kmalloc_array+0x34/0x88 [ 37.862750] copy_user_test_oob+0xac/0xec8 [ 37.862861] kunit_try_run_case+0x170/0x3f0 [ 37.863165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.863314] kthread+0x328/0x630 [ 37.863457] ret_from_fork+0x10/0x20 [ 37.863602] [ 37.863787] The buggy address belongs to the object at fff00000c77e6a00 [ 37.863787] which belongs to the cache kmalloc-128 of size 128 [ 37.864193] The buggy address is located 0 bytes inside of [ 37.864193] allocated 120-byte region [fff00000c77e6a00, fff00000c77e6a78) [ 37.864431] [ 37.864494] The buggy address belongs to the physical page: [ 37.864587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e6 [ 37.864757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.864940] page_type: f5(slab) [ 37.865076] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.865280] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.865492] page dumped because: kasan: bad access detected [ 37.865651] [ 37.865813] Memory state around the buggy address: [ 37.865933] fff00000c77e6900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.866066] fff00000c77e6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.866239] >fff00000c77e6a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.866379] ^ [ 37.866706] fff00000c77e6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.866954] fff00000c77e6b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.867152] ================================================================== [ 37.833648] ================================================================== [ 37.833868] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 37.834504] Write of size 121 at addr fff00000c77e6a00 by task kunit_try_catch/296 [ 37.834643] [ 37.834750] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 37.834978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.835050] Hardware name: linux,dummy-virt (DT) [ 37.835150] Call trace: [ 37.835556] show_stack+0x20/0x38 (C) [ 37.836142] dump_stack_lvl+0x8c/0xd0 [ 37.836447] print_report+0x118/0x608 [ 37.836827] kasan_report+0xdc/0x128 [ 37.836986] kasan_check_range+0x100/0x1a8 [ 37.837401] __kasan_check_write+0x20/0x30 [ 37.837551] copy_user_test_oob+0x234/0xec8 [ 37.838077] kunit_try_run_case+0x170/0x3f0 [ 37.838288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.838819] kthread+0x328/0x630 [ 37.839329] ret_from_fork+0x10/0x20 [ 37.839814] [ 37.840127] Allocated by task 296: [ 37.840220] kasan_save_stack+0x3c/0x68 [ 37.840331] kasan_save_track+0x20/0x40 [ 37.840665] kasan_save_alloc_info+0x40/0x58 [ 37.841242] __kasan_kmalloc+0xd4/0xd8 [ 37.841500] __kmalloc_noprof+0x198/0x4c8 [ 37.841636] kunit_kmalloc_array+0x34/0x88 [ 37.841736] copy_user_test_oob+0xac/0xec8 [ 37.841839] kunit_try_run_case+0x170/0x3f0 [ 37.841973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.842111] kthread+0x328/0x630 [ 37.842202] ret_from_fork+0x10/0x20 [ 37.842325] [ 37.842396] The buggy address belongs to the object at fff00000c77e6a00 [ 37.842396] which belongs to the cache kmalloc-128 of size 128 [ 37.842551] The buggy address is located 0 bytes inside of [ 37.842551] allocated 120-byte region [fff00000c77e6a00, fff00000c77e6a78) [ 37.842703] [ 37.842761] The buggy address belongs to the physical page: [ 37.842846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e6 [ 37.843176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.843642] page_type: f5(slab) [ 37.844009] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.844289] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.844434] page dumped because: kasan: bad access detected [ 37.844538] [ 37.844602] Memory state around the buggy address: [ 37.844691] fff00000c77e6900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.844853] fff00000c77e6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.845146] >fff00000c77e6a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.845437] ^ [ 37.845563] fff00000c77e6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.845816] fff00000c77e6b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.845935] ================================================================== [ 37.887958] ================================================================== [ 37.888070] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 37.888193] Read of size 121 at addr fff00000c77e6a00 by task kunit_try_catch/296 [ 37.888319] [ 37.888384] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 37.888748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.888829] Hardware name: linux,dummy-virt (DT) [ 37.888934] Call trace: [ 37.889093] show_stack+0x20/0x38 (C) [ 37.889434] dump_stack_lvl+0x8c/0xd0 [ 37.889701] print_report+0x118/0x608 [ 37.889821] kasan_report+0xdc/0x128 [ 37.889963] kasan_check_range+0x100/0x1a8 [ 37.890139] __kasan_check_read+0x20/0x30 [ 37.890315] copy_user_test_oob+0x3c8/0xec8 [ 37.890468] kunit_try_run_case+0x170/0x3f0 [ 37.890653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.890838] kthread+0x328/0x630 [ 37.891105] ret_from_fork+0x10/0x20 [ 37.891294] [ 37.891325] Allocated by task 296: [ 37.891397] kasan_save_stack+0x3c/0x68 [ 37.891477] kasan_save_track+0x20/0x40 [ 37.891529] kasan_save_alloc_info+0x40/0x58 [ 37.891586] __kasan_kmalloc+0xd4/0xd8 [ 37.891673] __kmalloc_noprof+0x198/0x4c8 [ 37.891727] kunit_kmalloc_array+0x34/0x88 [ 37.891775] copy_user_test_oob+0xac/0xec8 [ 37.891822] kunit_try_run_case+0x170/0x3f0 [ 37.891871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.892079] kthread+0x328/0x630 [ 37.892713] ret_from_fork+0x10/0x20 [ 37.893169] [ 37.893347] The buggy address belongs to the object at fff00000c77e6a00 [ 37.893347] which belongs to the cache kmalloc-128 of size 128 [ 37.893730] The buggy address is located 0 bytes inside of [ 37.893730] allocated 120-byte region [fff00000c77e6a00, fff00000c77e6a78) [ 37.893910] [ 37.893964] The buggy address belongs to the physical page: [ 37.894797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e6 [ 37.895779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.895930] page_type: f5(slab) [ 37.896033] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.896159] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.896371] page dumped because: kasan: bad access detected [ 37.896468] [ 37.896534] Memory state around the buggy address: [ 37.896661] fff00000c77e6900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.896833] fff00000c77e6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.896976] >fff00000c77e6a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.897329] ^ [ 37.897654] fff00000c77e6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.897823] fff00000c77e6b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.897945] ================================================================== [ 37.908495] ================================================================== [ 37.908647] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 37.908812] Read of size 121 at addr fff00000c77e6a00 by task kunit_try_catch/296 [ 37.909045] [ 37.909154] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 37.909536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.909637] Hardware name: linux,dummy-virt (DT) [ 37.909784] Call trace: [ 37.909918] show_stack+0x20/0x38 (C) [ 37.910044] dump_stack_lvl+0x8c/0xd0 [ 37.910183] print_report+0x118/0x608 [ 37.910410] kasan_report+0xdc/0x128 [ 37.910627] kasan_check_range+0x100/0x1a8 [ 37.910958] __kasan_check_read+0x20/0x30 [ 37.911153] copy_user_test_oob+0x4a0/0xec8 [ 37.911313] kunit_try_run_case+0x170/0x3f0 [ 37.911445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.911568] kthread+0x328/0x630 [ 37.911684] ret_from_fork+0x10/0x20 [ 37.911808] [ 37.911862] Allocated by task 296: [ 37.911962] kasan_save_stack+0x3c/0x68 [ 37.912058] kasan_save_track+0x20/0x40 [ 37.912279] kasan_save_alloc_info+0x40/0x58 [ 37.912480] __kasan_kmalloc+0xd4/0xd8 [ 37.912588] __kmalloc_noprof+0x198/0x4c8 [ 37.912755] kunit_kmalloc_array+0x34/0x88 [ 37.912910] copy_user_test_oob+0xac/0xec8 [ 37.913033] kunit_try_run_case+0x170/0x3f0 [ 37.913223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.913384] kthread+0x328/0x630 [ 37.913504] ret_from_fork+0x10/0x20 [ 37.913605] [ 37.913682] The buggy address belongs to the object at fff00000c77e6a00 [ 37.913682] which belongs to the cache kmalloc-128 of size 128 [ 37.913906] The buggy address is located 0 bytes inside of [ 37.913906] allocated 120-byte region [fff00000c77e6a00, fff00000c77e6a78) [ 37.914076] [ 37.914221] The buggy address belongs to the physical page: [ 37.914313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e6 [ 37.914478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.914603] page_type: f5(slab) [ 37.914723] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.914855] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.915043] page dumped because: kasan: bad access detected [ 37.915161] [ 37.915222] Memory state around the buggy address: [ 37.915354] fff00000c77e6900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.915519] fff00000c77e6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.915769] >fff00000c77e6a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.915900] ^ [ 37.916085] fff00000c77e6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.916366] fff00000c77e6b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.916481] ================================================================== [ 37.877188] ================================================================== [ 37.877477] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 37.879294] Write of size 121 at addr fff00000c77e6a00 by task kunit_try_catch/296 [ 37.879604] [ 37.879939] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 37.880199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.880330] Hardware name: linux,dummy-virt (DT) [ 37.880382] Call trace: [ 37.880416] show_stack+0x20/0x38 (C) [ 37.880507] dump_stack_lvl+0x8c/0xd0 [ 37.880595] print_report+0x118/0x608 [ 37.880659] kasan_report+0xdc/0x128 [ 37.880715] kasan_check_range+0x100/0x1a8 [ 37.880777] __kasan_check_write+0x20/0x30 [ 37.880836] copy_user_test_oob+0x35c/0xec8 [ 37.881033] kunit_try_run_case+0x170/0x3f0 [ 37.881193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.881333] kthread+0x328/0x630 [ 37.881445] ret_from_fork+0x10/0x20 [ 37.881579] [ 37.881753] Allocated by task 296: [ 37.881836] kasan_save_stack+0x3c/0x68 [ 37.882014] kasan_save_track+0x20/0x40 [ 37.882265] kasan_save_alloc_info+0x40/0x58 [ 37.882495] __kasan_kmalloc+0xd4/0xd8 [ 37.882633] __kmalloc_noprof+0x198/0x4c8 [ 37.882728] kunit_kmalloc_array+0x34/0x88 [ 37.882831] copy_user_test_oob+0xac/0xec8 [ 37.882959] kunit_try_run_case+0x170/0x3f0 [ 37.883076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.883263] kthread+0x328/0x630 [ 37.883388] ret_from_fork+0x10/0x20 [ 37.883529] [ 37.883595] The buggy address belongs to the object at fff00000c77e6a00 [ 37.883595] which belongs to the cache kmalloc-128 of size 128 [ 37.883753] The buggy address is located 0 bytes inside of [ 37.883753] allocated 120-byte region [fff00000c77e6a00, fff00000c77e6a78) [ 37.883944] [ 37.884007] The buggy address belongs to the physical page: [ 37.884146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e6 [ 37.884291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.884431] page_type: f5(slab) [ 37.884554] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.884698] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.884863] page dumped because: kasan: bad access detected [ 37.885003] [ 37.885061] Memory state around the buggy address: [ 37.885144] fff00000c77e6900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.885250] fff00000c77e6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.885360] >fff00000c77e6a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.885458] ^ [ 37.885579] fff00000c77e6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.885704] fff00000c77e6b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.885974] ================================================================== [ 37.899647] ================================================================== [ 37.899950] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 37.900067] Write of size 121 at addr fff00000c77e6a00 by task kunit_try_catch/296 [ 37.900399] [ 37.900592] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 37.901120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.901194] Hardware name: linux,dummy-virt (DT) [ 37.901267] Call trace: [ 37.901325] show_stack+0x20/0x38 (C) [ 37.901440] dump_stack_lvl+0x8c/0xd0 [ 37.901559] print_report+0x118/0x608 [ 37.901676] kasan_report+0xdc/0x128 [ 37.901792] kasan_check_range+0x100/0x1a8 [ 37.901932] __kasan_check_write+0x20/0x30 [ 37.902072] copy_user_test_oob+0x434/0xec8 [ 37.902217] kunit_try_run_case+0x170/0x3f0 [ 37.902373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.902529] kthread+0x328/0x630 [ 37.902674] ret_from_fork+0x10/0x20 [ 37.902847] [ 37.902925] Allocated by task 296: [ 37.903033] kasan_save_stack+0x3c/0x68 [ 37.903176] kasan_save_track+0x20/0x40 [ 37.903308] kasan_save_alloc_info+0x40/0x58 [ 37.903513] __kasan_kmalloc+0xd4/0xd8 [ 37.903629] __kmalloc_noprof+0x198/0x4c8 [ 37.903750] kunit_kmalloc_array+0x34/0x88 [ 37.904049] copy_user_test_oob+0xac/0xec8 [ 37.904214] kunit_try_run_case+0x170/0x3f0 [ 37.904330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.904461] kthread+0x328/0x630 [ 37.904593] ret_from_fork+0x10/0x20 [ 37.904737] [ 37.904800] The buggy address belongs to the object at fff00000c77e6a00 [ 37.904800] which belongs to the cache kmalloc-128 of size 128 [ 37.904960] The buggy address is located 0 bytes inside of [ 37.904960] allocated 120-byte region [fff00000c77e6a00, fff00000c77e6a78) [ 37.905113] [ 37.905170] The buggy address belongs to the physical page: [ 37.905279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e6 [ 37.905436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.905555] page_type: f5(slab) [ 37.905648] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.905838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.905966] page dumped because: kasan: bad access detected [ 37.906067] [ 37.906151] Memory state around the buggy address: [ 37.906273] fff00000c77e6900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.906483] fff00000c77e6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.906743] >fff00000c77e6a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.906855] ^ [ 37.906979] fff00000c77e6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.907089] fff00000c77e6b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.907211] ==================================================================
[ 35.130701] ================================================================== [ 35.131214] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 35.131985] Read of size 121 at addr ffff888102df6500 by task kunit_try_catch/315 [ 35.132606] [ 35.132948] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 35.133058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.133088] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.133132] Call Trace: [ 35.133173] <TASK> [ 35.133209] dump_stack_lvl+0x73/0xb0 [ 35.133275] print_report+0xd1/0x650 [ 35.133321] ? __virt_addr_valid+0x1db/0x2d0 [ 35.133372] ? copy_user_test_oob+0x4aa/0x10f0 [ 35.133419] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.133471] ? copy_user_test_oob+0x4aa/0x10f0 [ 35.133521] kasan_report+0x141/0x180 [ 35.133590] ? copy_user_test_oob+0x4aa/0x10f0 [ 35.133692] kasan_check_range+0x10c/0x1c0 [ 35.133761] __kasan_check_read+0x15/0x20 [ 35.133892] copy_user_test_oob+0x4aa/0x10f0 [ 35.133969] ? __pfx_copy_user_test_oob+0x10/0x10 [ 35.134032] ? finish_task_switch.isra.0+0x153/0x700 [ 35.134098] ? __switch_to+0x47/0xf50 [ 35.134170] ? __schedule+0x10cc/0x2b60 [ 35.134241] ? __pfx_read_tsc+0x10/0x10 [ 35.134352] ? ktime_get_ts64+0x86/0x230 [ 35.134424] kunit_try_run_case+0x1a5/0x480 [ 35.134533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.134657] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 35.134730] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.134797] ? __kthread_parkme+0x82/0x180 [ 35.134895] ? preempt_count_sub+0x50/0x80 [ 35.134981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.135052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.135122] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.135231] kthread+0x337/0x6f0 [ 35.135311] ? trace_preempt_on+0x20/0xc0 [ 35.135375] ? __pfx_kthread+0x10/0x10 [ 35.135421] ? _raw_spin_unlock_irq+0x47/0x80 [ 35.135455] ? calculate_sigpending+0x7b/0xa0 [ 35.135490] ? __pfx_kthread+0x10/0x10 [ 35.135519] ret_from_fork+0x116/0x1d0 [ 35.135571] ? __pfx_kthread+0x10/0x10 [ 35.135602] ret_from_fork_asm+0x1a/0x30 [ 35.135669] </TASK> [ 35.135686] [ 35.149331] Allocated by task 315: [ 35.149810] kasan_save_stack+0x45/0x70 [ 35.150219] kasan_save_track+0x18/0x40 [ 35.150688] kasan_save_alloc_info+0x3b/0x50 [ 35.151050] __kasan_kmalloc+0xb7/0xc0 [ 35.151476] __kmalloc_noprof+0x1c9/0x500 [ 35.151996] kunit_kmalloc_array+0x25/0x60 [ 35.152322] copy_user_test_oob+0xab/0x10f0 [ 35.152786] kunit_try_run_case+0x1a5/0x480 [ 35.153229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.153843] kthread+0x337/0x6f0 [ 35.154211] ret_from_fork+0x116/0x1d0 [ 35.154721] ret_from_fork_asm+0x1a/0x30 [ 35.155235] [ 35.155454] The buggy address belongs to the object at ffff888102df6500 [ 35.155454] which belongs to the cache kmalloc-128 of size 128 [ 35.156747] The buggy address is located 0 bytes inside of [ 35.156747] allocated 120-byte region [ffff888102df6500, ffff888102df6578) [ 35.158160] [ 35.158382] The buggy address belongs to the physical page: [ 35.158963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102df6 [ 35.159646] flags: 0x200000000000000(node=0|zone=2) [ 35.160128] page_type: f5(slab) [ 35.160466] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 35.161108] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.161741] page dumped because: kasan: bad access detected [ 35.162281] [ 35.162520] Memory state around the buggy address: [ 35.163795] ffff888102df6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.164365] ffff888102df6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.164751] >ffff888102df6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.164942] ^ [ 35.165126] ffff888102df6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.165306] ffff888102df6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.165483] ================================================================== [ 35.166914] ================================================================== [ 35.167664] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 35.168444] Write of size 121 at addr ffff888102df6500 by task kunit_try_catch/315 [ 35.169693] [ 35.170006] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 35.170127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.170164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.170217] Call Trace: [ 35.170257] <TASK> [ 35.170297] dump_stack_lvl+0x73/0xb0 [ 35.170372] print_report+0xd1/0x650 [ 35.170431] ? __virt_addr_valid+0x1db/0x2d0 [ 35.170498] ? copy_user_test_oob+0x557/0x10f0 [ 35.170558] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.170597] ? copy_user_test_oob+0x557/0x10f0 [ 35.170649] kasan_report+0x141/0x180 [ 35.170696] ? copy_user_test_oob+0x557/0x10f0 [ 35.170734] kasan_check_range+0x10c/0x1c0 [ 35.170768] __kasan_check_write+0x18/0x20 [ 35.170800] copy_user_test_oob+0x557/0x10f0 [ 35.170835] ? __pfx_copy_user_test_oob+0x10/0x10 [ 35.170865] ? finish_task_switch.isra.0+0x153/0x700 [ 35.170897] ? __switch_to+0x47/0xf50 [ 35.170931] ? __schedule+0x10cc/0x2b60 [ 35.170965] ? __pfx_read_tsc+0x10/0x10 [ 35.170996] ? ktime_get_ts64+0x86/0x230 [ 35.171031] kunit_try_run_case+0x1a5/0x480 [ 35.171067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.171098] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 35.171132] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.171165] ? __kthread_parkme+0x82/0x180 [ 35.171194] ? preempt_count_sub+0x50/0x80 [ 35.171225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.171257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.171290] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.171323] kthread+0x337/0x6f0 [ 35.171350] ? trace_preempt_on+0x20/0xc0 [ 35.171381] ? __pfx_kthread+0x10/0x10 [ 35.171410] ? _raw_spin_unlock_irq+0x47/0x80 [ 35.171440] ? calculate_sigpending+0x7b/0xa0 [ 35.171473] ? __pfx_kthread+0x10/0x10 [ 35.171503] ret_from_fork+0x116/0x1d0 [ 35.171529] ? __pfx_kthread+0x10/0x10 [ 35.171577] ret_from_fork_asm+0x1a/0x30 [ 35.171618] </TASK> [ 35.171652] [ 35.183146] Allocated by task 315: [ 35.183517] kasan_save_stack+0x45/0x70 [ 35.183969] kasan_save_track+0x18/0x40 [ 35.184233] kasan_save_alloc_info+0x3b/0x50 [ 35.184671] __kasan_kmalloc+0xb7/0xc0 [ 35.184916] __kmalloc_noprof+0x1c9/0x500 [ 35.185210] kunit_kmalloc_array+0x25/0x60 [ 35.185654] copy_user_test_oob+0xab/0x10f0 [ 35.186075] kunit_try_run_case+0x1a5/0x480 [ 35.186464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.186894] kthread+0x337/0x6f0 [ 35.187130] ret_from_fork+0x116/0x1d0 [ 35.187519] ret_from_fork_asm+0x1a/0x30 [ 35.187936] [ 35.188076] The buggy address belongs to the object at ffff888102df6500 [ 35.188076] which belongs to the cache kmalloc-128 of size 128 [ 35.188998] The buggy address is located 0 bytes inside of [ 35.188998] allocated 120-byte region [ffff888102df6500, ffff888102df6578) [ 35.189743] [ 35.189942] The buggy address belongs to the physical page: [ 35.190350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102df6 [ 35.190924] flags: 0x200000000000000(node=0|zone=2) [ 35.191399] page_type: f5(slab) [ 35.191752] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 35.192279] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.192755] page dumped because: kasan: bad access detected [ 35.193041] [ 35.193167] Memory state around the buggy address: [ 35.193419] ffff888102df6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.194013] ffff888102df6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.194690] >ffff888102df6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.195329] ^ [ 35.195995] ffff888102df6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.196608] ffff888102df6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.197072] ================================================================== [ 35.198245] ================================================================== [ 35.199192] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 35.200105] Read of size 121 at addr ffff888102df6500 by task kunit_try_catch/315 [ 35.200869] [ 35.201063] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 35.201156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.201183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.201239] Call Trace: [ 35.201280] <TASK> [ 35.201315] dump_stack_lvl+0x73/0xb0 [ 35.201380] print_report+0xd1/0x650 [ 35.201428] ? __virt_addr_valid+0x1db/0x2d0 [ 35.201480] ? copy_user_test_oob+0x604/0x10f0 [ 35.201526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.201600] ? copy_user_test_oob+0x604/0x10f0 [ 35.201650] kasan_report+0x141/0x180 [ 35.201701] ? copy_user_test_oob+0x604/0x10f0 [ 35.201776] kasan_check_range+0x10c/0x1c0 [ 35.201847] __kasan_check_read+0x15/0x20 [ 35.201918] copy_user_test_oob+0x604/0x10f0 [ 35.201990] ? __pfx_copy_user_test_oob+0x10/0x10 [ 35.202055] ? finish_task_switch.isra.0+0x153/0x700 [ 35.202121] ? __switch_to+0x47/0xf50 [ 35.202194] ? __schedule+0x10cc/0x2b60 [ 35.202266] ? __pfx_read_tsc+0x10/0x10 [ 35.202331] ? ktime_get_ts64+0x86/0x230 [ 35.202401] kunit_try_run_case+0x1a5/0x480 [ 35.202472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.202584] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 35.202690] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.202763] ? __kthread_parkme+0x82/0x180 [ 35.202822] ? preempt_count_sub+0x50/0x80 [ 35.202890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.202958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.203021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.203083] kthread+0x337/0x6f0 [ 35.203138] ? trace_preempt_on+0x20/0xc0 [ 35.203200] ? __pfx_kthread+0x10/0x10 [ 35.203251] ? _raw_spin_unlock_irq+0x47/0x80 [ 35.203312] ? calculate_sigpending+0x7b/0xa0 [ 35.203371] ? __pfx_kthread+0x10/0x10 [ 35.203427] ret_from_fork+0x116/0x1d0 [ 35.203473] ? __pfx_kthread+0x10/0x10 [ 35.203526] ret_from_fork_asm+0x1a/0x30 [ 35.203655] </TASK> [ 35.203689] [ 35.216024] Allocated by task 315: [ 35.216423] kasan_save_stack+0x45/0x70 [ 35.216893] kasan_save_track+0x18/0x40 [ 35.217299] kasan_save_alloc_info+0x3b/0x50 [ 35.217786] __kasan_kmalloc+0xb7/0xc0 [ 35.218130] __kmalloc_noprof+0x1c9/0x500 [ 35.218391] kunit_kmalloc_array+0x25/0x60 [ 35.218855] copy_user_test_oob+0xab/0x10f0 [ 35.219278] kunit_try_run_case+0x1a5/0x480 [ 35.219696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.220196] kthread+0x337/0x6f0 [ 35.220524] ret_from_fork+0x116/0x1d0 [ 35.220828] ret_from_fork_asm+0x1a/0x30 [ 35.221227] [ 35.221438] The buggy address belongs to the object at ffff888102df6500 [ 35.221438] which belongs to the cache kmalloc-128 of size 128 [ 35.222275] The buggy address is located 0 bytes inside of [ 35.222275] allocated 120-byte region [ffff888102df6500, ffff888102df6578) [ 35.222881] [ 35.223027] The buggy address belongs to the physical page: [ 35.223302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102df6 [ 35.223872] flags: 0x200000000000000(node=0|zone=2) [ 35.224316] page_type: f5(slab) [ 35.224721] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 35.225399] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.226110] page dumped because: kasan: bad access detected [ 35.226605] [ 35.226828] Memory state around the buggy address: [ 35.227282] ffff888102df6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.227766] ffff888102df6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.228389] >ffff888102df6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.228917] ^ [ 35.229383] ffff888102df6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.229844] ffff888102df6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.230192] ================================================================== [ 35.092810] ================================================================== [ 35.093254] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 35.094040] Write of size 121 at addr ffff888102df6500 by task kunit_try_catch/315 [ 35.094743] [ 35.095180] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 35.095304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.095340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.095388] Call Trace: [ 35.095420] <TASK> [ 35.095458] dump_stack_lvl+0x73/0xb0 [ 35.095530] print_report+0xd1/0x650 [ 35.095610] ? __virt_addr_valid+0x1db/0x2d0 [ 35.095672] ? copy_user_test_oob+0x3fd/0x10f0 [ 35.095737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.095804] ? copy_user_test_oob+0x3fd/0x10f0 [ 35.095872] kasan_report+0x141/0x180 [ 35.095933] ? copy_user_test_oob+0x3fd/0x10f0 [ 35.096013] kasan_check_range+0x10c/0x1c0 [ 35.096081] __kasan_check_write+0x18/0x20 [ 35.096202] copy_user_test_oob+0x3fd/0x10f0 [ 35.096296] ? __pfx_copy_user_test_oob+0x10/0x10 [ 35.096364] ? finish_task_switch.isra.0+0x153/0x700 [ 35.096412] ? __switch_to+0x47/0xf50 [ 35.096451] ? __schedule+0x10cc/0x2b60 [ 35.096489] ? __pfx_read_tsc+0x10/0x10 [ 35.096521] ? ktime_get_ts64+0x86/0x230 [ 35.096578] kunit_try_run_case+0x1a5/0x480 [ 35.096616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.096674] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 35.096709] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.096743] ? __kthread_parkme+0x82/0x180 [ 35.096773] ? preempt_count_sub+0x50/0x80 [ 35.096804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.096836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.096869] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.096902] kthread+0x337/0x6f0 [ 35.096930] ? trace_preempt_on+0x20/0xc0 [ 35.096963] ? __pfx_kthread+0x10/0x10 [ 35.096992] ? _raw_spin_unlock_irq+0x47/0x80 [ 35.097023] ? calculate_sigpending+0x7b/0xa0 [ 35.097055] ? __pfx_kthread+0x10/0x10 [ 35.097085] ret_from_fork+0x116/0x1d0 [ 35.097111] ? __pfx_kthread+0x10/0x10 [ 35.097140] ret_from_fork_asm+0x1a/0x30 [ 35.097181] </TASK> [ 35.097197] [ 35.112958] Allocated by task 315: [ 35.113330] kasan_save_stack+0x45/0x70 [ 35.113886] kasan_save_track+0x18/0x40 [ 35.114214] kasan_save_alloc_info+0x3b/0x50 [ 35.114826] __kasan_kmalloc+0xb7/0xc0 [ 35.115218] __kmalloc_noprof+0x1c9/0x500 [ 35.115680] kunit_kmalloc_array+0x25/0x60 [ 35.116097] copy_user_test_oob+0xab/0x10f0 [ 35.116532] kunit_try_run_case+0x1a5/0x480 [ 35.116954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.117328] kthread+0x337/0x6f0 [ 35.117582] ret_from_fork+0x116/0x1d0 [ 35.117824] ret_from_fork_asm+0x1a/0x30 [ 35.118216] [ 35.118474] The buggy address belongs to the object at ffff888102df6500 [ 35.118474] which belongs to the cache kmalloc-128 of size 128 [ 35.119705] The buggy address is located 0 bytes inside of [ 35.119705] allocated 120-byte region [ffff888102df6500, ffff888102df6578) [ 35.120805] [ 35.120958] The buggy address belongs to the physical page: [ 35.121236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102df6 [ 35.122082] flags: 0x200000000000000(node=0|zone=2) [ 35.122610] page_type: f5(slab) [ 35.122963] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 35.123517] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.124152] page dumped because: kasan: bad access detected [ 35.124597] [ 35.124867] Memory state around the buggy address: [ 35.125370] ffff888102df6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.125991] ffff888102df6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.126604] >ffff888102df6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.127276] ^ [ 35.127937] ffff888102df6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.128526] ffff888102df6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.129055] ==================================================================